iOS application restrictions

Keyboard Shortcuts

Many applications access the data stored on a device. But how do they use that data? Ryan Spence explains how to securely control the behavior of an application when it is running on your device. Keep your data secure from prying eyes. Explore how applications access your data, to secure your device from third-party developers.

- Software is a complex system of functions…and vulnerabilities.…iOS has made it possible to control applications…simply by turning them off.…Turning an application off through restrictions…hides the application from the user.…On the phone, it will look like the application…isn't even installed.…I will access restrictions by going to Settings,…General, and swiping down to Restrictions.…Restrictions are off by default.…I will select Enable Restrictions.…

I will also enter a restrictions passcode.…I only have the option to set a four digit PIN,…but because this setting is secured behind the passcode,…four digits will work.…If I disabled restrictions sometime in the future,…I will need to enter my passcode…and verify by entering it again.…Once enabled, I can determine if any…of the applications are a security threat to me.…I want to disable everything I don't use,…which disables yet another potential access point…from malicious activity.…To start off, I don't have a car…that can take advantage of CarPlay,…so I'll disable it.…

Resume Transcript Auto-Scroll

Author

Released

12/23/2015

Get a practical, hands-on approach to mobile security: securing your Android or iOS phone or tablet against hackers, thieves, and snoops. Mobile expert Ryan Spence explains the importance of securing a mobile device in today's risky technological landscape, and covers some general topics: choosing and safely disposing of devices, using passwords, and backing up device data. He will then cover the specifics of securing the two most common mobile operating systems: Android and iOS. Finally, he'll show how to secure the physical components of your device, including the camera, microphone, and radios.

Topics include:

Understanding mobile security risks

Buying and disposing of mobile devices

Setting up mobile passwords

Implementing lock screen security

Adjusting Android admin settings and iOS privacy options

Setting up options to find your phone

Securing cameras, microphones, and other hardware on your mobile device